article thumbnail

10 key CoSN back-to-school resources for edtech leaders

eSchool News

Before purchasing a third-party solution, ask the solution provider to complete the K-12CVAT tool to confirm that information, data and cybersecurity policies are in place to protect sensitive school system information and constituents’ PII. Download the K-12 Community Vendor Assessment Tool. Preview the CoSN TLE Seal Application.

EdTech 123
article thumbnail

10 key CoSN back-to-school resources for edtech leaders

eSchool News

Before purchasing a third-party solution, ask the solution provider to complete the K-12CVAT tool to confirm that information, data and cybersecurity policies are in place to protect sensitive school system information and constituents’ PII. Download the K-12 Community Vendor Assessment Tool. Preview the CoSN TLE Seal Application.

EdTech 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Critical Guidelines for Student Data Privacy

edWeb.net

Teachers can no longer download any app they want and use it the same day—every piece of instructional technology must be vetted for how it relates to educational goals and checked against software the school already has. More important, though, every piece of technology must adhere to the district’s student data privacy policies.

article thumbnail

Get to the root of the edtech issues with three key questions

edWeb.net

Starting from the early days of online education tools, teachers have been downloading their favorites and sharing them with students. This can cause several issues from inequity in how students are taught to network issues as teachers access their personal playlists. I’m not interested in checking a box. Join the Community.

EdTech 40
article thumbnail

The Keys to Discussing Student Data Privacy

edWeb.net

Despite universal concerns about student data privacy, communicating school policies can quickly overwhelm school leaders. CoSN has stepped in with guidance for superintendents and principals to help them with several aspects of student data privacy, including best practices for informing the community.

article thumbnail

How Should We Approach the Ethical Considerations of AI in K-12 Education?

Edsurge

Tools like Turnitin that check for plagiarism, intelligent tutoring softwares like Khan Academy or iReady that automate or personalize instruction, and chatbots like Alexa that answer student questions are all vulnerable to algorithmic biases in development and inequitable outcomes in implementation.

article thumbnail

Making The Best Technology Purchasing Decisions

The Web20Classroom

Reading terms of service is a start but asking questions like how much PII is actually needed for the software to run or how is the data stored or is it encrypted in transit and rest are some of the most basic questions to have solid answers to before allowing any company access to data sources. Download it here.